Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 18:44
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
870KB
-
MD5
e93af50428fcc74af931bfed7a1dc1b2
-
SHA1
9d49afd20fdd7b02944c149c86e5d94038d2311f
-
SHA256
19013092dd66f787e2f8b3236f835ed4dba319e909ebdccdc6454aeac6530005
-
SHA512
2f1a273123d09c94d778830d7498813df37eb33c7adf82abd0831e9658f0eae5ec3ea8945035295074b9eb4e94f446be05f16a5ace9a62a8fee281f421e01981
-
SSDEEP
12288:DoqwmCU3rRTTClQzzBnBwbwZ04htC5hDHsrY+oC9Q7ICnqDNs7Q+sSG61OMk+xID:klQN/TBBw0Z0KE5hDHeH3wqa7Q+O0
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 2 IoCs
pid Process 4856 Avywuixyxmexxtr.exe 1124 Avywuixyxmexxtr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Avywuixyxmexxtr.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Local\\Avywuixyxmexxtr.exe" Avywuixyxmexxtr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3436 wrote to memory of 4856 3436 Trojan-Ransom.Win32.Blocker.exe 80 PID 3436 wrote to memory of 4856 3436 Trojan-Ransom.Win32.Blocker.exe 80 PID 3436 wrote to memory of 4856 3436 Trojan-Ransom.Win32.Blocker.exe 80 PID 4856 wrote to memory of 1124 4856 Avywuixyxmexxtr.exe 81 PID 4856 wrote to memory of 1124 4856 Avywuixyxmexxtr.exe 81 PID 4856 wrote to memory of 1124 4856 Avywuixyxmexxtr.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" "-rC:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe"C:\Users\Admin\AppData\Local\Avywuixyxmexxtr.exe" -w2743⤵
- Executes dropped EXE
PID:1124
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
870KB
MD5e93af50428fcc74af931bfed7a1dc1b2
SHA19d49afd20fdd7b02944c149c86e5d94038d2311f
SHA25619013092dd66f787e2f8b3236f835ed4dba319e909ebdccdc6454aeac6530005
SHA5122f1a273123d09c94d778830d7498813df37eb33c7adf82abd0831e9658f0eae5ec3ea8945035295074b9eb4e94f446be05f16a5ace9a62a8fee281f421e01981
-
Filesize
870KB
MD5e93af50428fcc74af931bfed7a1dc1b2
SHA19d49afd20fdd7b02944c149c86e5d94038d2311f
SHA25619013092dd66f787e2f8b3236f835ed4dba319e909ebdccdc6454aeac6530005
SHA5122f1a273123d09c94d778830d7498813df37eb33c7adf82abd0831e9658f0eae5ec3ea8945035295074b9eb4e94f446be05f16a5ace9a62a8fee281f421e01981
-
Filesize
870KB
MD5e93af50428fcc74af931bfed7a1dc1b2
SHA19d49afd20fdd7b02944c149c86e5d94038d2311f
SHA25619013092dd66f787e2f8b3236f835ed4dba319e909ebdccdc6454aeac6530005
SHA5122f1a273123d09c94d778830d7498813df37eb33c7adf82abd0831e9658f0eae5ec3ea8945035295074b9eb4e94f446be05f16a5ace9a62a8fee281f421e01981